Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feedback from OSSF: Can we discuss reconsidering a feature like PR 298 #2958

Open
kerberosmansour opened this issue Nov 16, 2020 · 1 comment

Comments

@kerberosmansour
Copy link

Story:
As a security team, we want discovery tools which can identify the software running on an end point/workload (container/VM/Physical system etc..), and map the software version with impacted CVEs. In order to do that we would like orgs/vendor the ability/option to be able to embeds Unique Software identifiers such as CPEs or PURL in the binary/package.

There has been a PR already raised before and is being discussed in the Linux Foundation's OSSF Vulnerability disclosure working group. #298

If you are interested, please visit the working group to discuss as we can help the project as well: https://github.com/ossf/wg-vulnerability-disclosures

@jeremylong
Copy link
Owner

@kerberosmansour I think you misunderstand my objection to #298. It is not that the idea doesn't have merit - it is that building a format in a scanning tool and requesting the world use the format is the wrong approach. Instead, we need to work with the build and packaging tools to start generating an SBOM and embedding it as a standard part of the build output. See ossf/wg-vulnerability-disclosures#76 (comment).

I would be fine including a scanner for an SBOM format - if it were actually used and commonly available on more than a small handful of products. The issue is I have yet to see an SBOM format being widely used.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants